If this is your first visit, be sure to
check out the Forum Rules by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Of course, if you really wanted to have some fun, go to Wal-Mart late at night and ask the greeter if they could help you find trashbags, roll of carpet, rope, quicklime, clorox and a shovel. See if they give you any strange looks. --Streaker69

Relationship Based Hacking

Relationship Based Hacking
We have our basic ping = "Hey my name is" or "How ya doin"
Then once we have an established connection = "A date or two"
We try to hack the firewall = "The lady playing hard to get"
Now some firewalls are better than others requiring a more sophisticated approach
Which is Port Knocking = "Flirting with friends or establishing a slight bit of jelousy"
Once the "SYSTEM" has been penetrated we take over =" Inserting the worm"
This concludes the RELATIONSIP BASED HACKING TUTORIAL

A third party security audit is the IT equivalent of a colonoscopy. It's long, intrusive, very uncomfortable, and when it's done, you'll have seen things you really didn't want to see, and you'll never forget that you've had one.